OOPSIE WOOPSIE!! Uwu We made a fucky wucky!! A wittle fucko boingo! The code monkeys at our headquarters are working VEWY HAWD to fix this!
User Details
- User Since
- Jun 13 2024, 7:10 AM (87 w, 4 d)
- Availability
- Available
- IRC Nick
- BlankEclair
- LDAP User
- BlankEclair
- MediaWiki User
- BlankEclair [ Global Accounts ]
Nov 28 2025
Nov 25 2025
Nov 22 2025
Jul 4 2025
If you configure it such thta only logged-in users can read it, then alllwing previews would leak its contents for logged-out users, no?
Jul 3 2025
Jun 29 2025
Jun 6 2025
May 26 2025
I've faced this issue when my browser didn't send a Referer: https://wikipedialibrary.wmflabs.org/ header when accessing https://search-ebscohost-com.wikipedialibrary.idm.oclc.org/login.aspx.
May 18 2025
May 17 2025
Apr 25 2025
Apr 23 2025
I wonder if we can use the election ID as a part of the edit token salt, akin to rollback
Apr 20 2025
Sumimasen! Watashi will try to twanswate it ^^;
Hello everynyan!
I was reading the SecurePoll source code, and found some oopsie-whoopsies!! Therefore, I want somenone to fixie-wixie the problems (* ^ ω ^)
First off, ArchivePage.php and UnarchivePage.php do not check if the request is POSTed or has an edit token, so an eeeevil attacker can convince an election admin to archive or unarchive a page without their intention O.O
Additionyally, if one of the options for a single transferable vote with Droop quota poll is an cross-site scripting payload, such as <script>alert("OOPSIE WOOPSIE!! Uwu We made a fucky wucky!! A wittle fucko boingo! The code monkeys at our headquarters are working VEWY HAWD to fix this!")</script>, then a voter would get XSSed if they voted for the malicious option OwO
This problem is caused by line 432 of VotePage.php :3
And also, VoterEligibilityPage#executeClear() does not check if the request is POSTed or has a valid edit token, thus also leading to the first problem (︶︹︺)
I also saw that SetTranslationHandler.php doesn't validate that the user is an election admin, so an arbitrary user can change the text for an poll, even if they're not logged in! (⌒_⌒;)
Luckily, this functionality seems to be broken since MediaWiki 1.43, as it cannot properly get the request body and instead reports No valid body (o^▽^o)Lastly, the functions ResultPage::getPagesTab() and ResultPage::getErrorsTab() does nyot escape user input!! So if a malicious user can sneak in a malicious page name, this can happen:
Fortunately, the impact of this problem is reduced due to two things:
- All but one of the cross-site scripting vulnyable areas are inside elements' contents, which cannot contain the left-angle bracket or the right-angle bracket since it's a title 💮
- Thus, the one vulnerable area is inside tha attribute of an element. However, it depends on SetTranslationHandler.php to work to display, which we have already established doesn't on MediaWiki 1.43 🩷
Eto... I have one question, nya. For some reason, the edit token is checked when voting, but the request is still allowed if it's a CSF O.O
Instead, the scrutiners have to vawidate that the CSRF flag is not unset! I want to ask if you know the answer (#><)That's all :3
Mar 27 2025
Mar 25 2025
Mar 23 2025
https://www.mediawiki.org/wiki/LUAREF#frame:getTitle:
Returns the title associated with the frame as a string
Is there a way to reenable WebAuthn on auth.wikimedia.org right now? Or is it something to be planned in the future
Mar 22 2025
I suppose so :p
Mar 21 2025
Mar 17 2025
I suppose this can be implemented as a content handler? This would give us validateSave() to check types, and preSaveTransform() to also change icon_width to an integer if we so wish
Mar 10 2025
I have this exception after loading only Skin:Vector (b8febf782b5291d85c0d7a5f97fca9fd1b21abac), Extension:OOJSPlus (ec0a1051aa8c001c0bec22daf3d05d7c6c2d483b), and Extension:SimpleBlogPage (3d9ee78dfe360077da076cd7e00275f79b506d15, along with a local modification to extension.json to add "load_composer_autoloader": true to load composer dependencies):
MediaWiki internal error.
Mar 8 2025
Feb 22 2025
Feb 21 2025
Feb 20 2025
Feb 19 2025
LGTM
Feb 13 2025
We have to subscribe them to security tasks anyway because of the default view policy
Feb 12 2025
I only need it for REL1_43, but I personally try to backport every change I make (to versions that have not reached their end-of-life). Should I not?
Feb 11 2025
Jan 28 2025
Jan 21 2025
Jan 20 2025
Jan 19 2025
Personally, I tried to take a stab at it when I first filed it, but it was too complex for me to figure out.
Adding data-nosnippet to the relevant element should work, and it appears to work as Core also does that (T315259: Add data-nosnippet to the printfooter div, T353984: Sitenotice can appear as the preview in search results on google).
Jan 18 2025
I've been added to Trusted-Contributors.
Jan 16 2025
| Wikitech account/LDAP: | BlankEclair |
| SUL account | BlankEclair |
| Account linked on IDM | Y |
| I have visited MediaWiki:Loginprompt | Y |
| I have tried to reset my password using Special:PasswordReset | N |
Jan 15 2025
You're welcome ^_^
Jan 12 2025
Jan 11 2025
Jan 10 2025
Jan 7 2025
FYI, my trinklets page lists all public vulns I've found. As of writing, all but one (NeoChat) are MediaWiki extensions or skins
Dec 13 2024
The bug still happens without Extension:DisplayTitle:
Should this task be closed?
Dec 12 2024
i have no idea how my time management works
oops forgot a trim


